webapp-testing
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The helper script
scripts/with_server.pyexecutes commands usingsubprocess.Popenwithshell=True. This allows for arbitrary shell command execution. - [PROMPT_INJECTION]: The
SKILL.mdinstructions explicitly tell the agent not to read the source code of scripts before running them, which is a significant security anti-pattern. - [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection. * Ingestion points: Content is ingested via
page.content()andpage.locator().all()in automation scripts. * Boundary markers: None present. * Capability inventory: Shell execution viawith_server.pyand file writing viapage.screenshot. * Sanitization: No sanitization of web content is performed.
Audit Metadata